MIS 2201 Final Exam Questions and
100% Correct Verified Solutions|
Latest Update
Cyberespionage - Answer Development of malware that secretly steals data in
the computer systems of organizations, agencies, and firms.
Cyberterrorism - Answer intimidation of gov. of civilian population by using
information technology to disable critical national infrastructure.
Firewall - Answer system of software, hardware, or a combination of both that stands
guard between an organization's internal network and the internet and limits
networks based on the organization's access policy.
NGFW (next generation firewall) - Answer security system that is able to detect and
block sophisticated attacks by filtering network traffic on packet content.
Security Audit - Answer Evaluates whether organization has well-considered
security policy in place.
IDS (Intrusion Detection System) - Answer Notifies network security personnel when
it detects network traffic that attempts to circumvent security measures.
,Business Analytics - Answer Extensive use of data and quantitative analysis to
support face-based decision making within organizations.
Business Intelligence - Answer Includes a wide range of applications, practices, and
technologies for the extraction, transformation, integration, visualization, analysis
interpretation, and presentation of data to support improved decision making.
Data Scientist - Answer Individuals who have:
1. strong business background and experience.
2. healthy appreciation of limitations of their data, tools and techniques
3. Deep understanding of analytics.
Online Analytical Processing (OLAP) Analytic Tool - Answer Method to analyze
multidimensional data from many different perspectives. Shows trends in
and opportunities in businesses.
Data Cubes - Answer Container numeric facts called measures, which are categorized
by dimensions such as time and geography.
Data Mining (Analytic Tool) - Answer Used to explore large amounts of data for hidden
patterns to predict future trends and behaviors for use in decision making.
Association Analysis (Data Mining) - Answer specialized set of algorithms sorts
through data and forms statistical rules about relationships among the items
Case-Based Reasoning (Data Mining) - Answer Historical if-then-else cases are used
to recognize patterns
,Data Visualization (Analytic Tool) - Answer Presentation of data in pictorial or graphical
format. Brings dull and boring numbers into interesting visuals.
TagCrowd & Word Cloud - Answer Visual deception of words that have been
grouped together because of their frequency of occurrence.
Conversion Funnel - Answer Graphical Representation that summarizes steps a
consumer takes in making a decision to buy a product.
Linear Regression (Analytic Tool) - Answer Mathematical technique for predicting
the value of a dependent variable based on a single independent variable.
Dashboards (Analytic Tool) - Answer Measures metrics that track progress in
executing chosen strategies to attain organizational objects and goals.
Balanced Scorecard - Answer sets goals, measures, and targets for certain departments.
Key Performance Indicators (KPIs) - Answer Organization measure performance
of organization. Consists of objective, measure, target, and time frame.
Spreadsheets (Analytic Tool) - Answer Data based on formulas to create reports
and graphs on data.
Key element in response plan of security threat - Answer define who to notify and
who not to notify
MSSP (Managed Security Service Provider) - Answer Company that monitors,
manages, and maintain computer and network security for other organizations.
Risk Assessment - Answer Process of assessing security-related risks to an organization's
computer and networks form both internal and external threats.
Security Policy - Answer Defines a organization's security requirements along with the
controls and sanctions needed to meet those requirements. Outlines what needs to
be done.
Data - Answer Raw facts
Information - Answer Collection of data organized in a way that they have value.
Information System (IS) - Answer set of interrelated elements: collect, process, store,
disseminate data and information, provides feedback.
CBIS (computer-based information system) - Answer single set of hardware, software,
databases, networks, people, and procedures.
Personal IS - Answer IS systems that improve the productivity of individual users.
Group IS - Answer IS that improve communications and support collaboration
among members of a workgroup
Enterprise IS - Answer IS that organizations use to define structured interactions among
their own employees and/or external customers, suppliers, government agencies.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller KenAli. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.99. You're not tied to anything after your purchase.